Make private file access handling respect the full entity reference chain

Created on 26 August 2017, over 7 years ago
Updated 11 April 2023, almost 2 years ago

Problem/Motivation

Access to media files in the private file space is governed solely by 'view media' permission and publishing status. This means private assets are still visible, even if access to the node that relates to these media is forbidden.

Proposed resolution

The ideal way to fix this is to make media entities respect access control of their "parent" content. There's an earlier patch from @solide-echt that attempts to do this. However, this is tricky, because file_usage is tracking the entity that has the file attached; that means the media entity (*this* entity), not the node. There's an issue to resolve this at 📌 Track media usage and present it to the site builder (in the media library, media view, on media deletion confirmation, etc.) Active .

Without this, each media access check would involve the file usage query, N entity queries and then an access check for each matching entity, etc. While this might work as a site specific solution that has limited fields/content, it does not work as a generic solution in core.

Remaining tasks

This issue is blocked by #2835840 📌 Track media usage and present it to the site builder (in the media library, media view, on media deletion confirmation, etc.) Active (see above, and comment #8). But then...

- Discuss what the best approach for respecting the access in the whole relationship chain is
- Implement it

A proof-of-concept for testing out possible solutions is being started in contrib at https://drupal.org/project/media_private_access

User interface changes

TBD

API changes

TBD

Data model changes

TBD

Original report by solide-echt:

When the private file space is used for media access control to the media entities and underlying files is AFAIK governed solely by 'view media' permission and publishing status, as defined in /modules/media/src/MediaAccessControlHandler.php:

        return AccessResult::allowedIf($account->hasPermission('view media') && $entity->isPublished())
          ->cachePerPermissions()
          ->addCacheableDependency($entity);

This means private assets are still visible, even if access to the node that relates to these media is forbidden. Although media is focused on re-using existing media I believe the possibility to re-use media should not include assets that are meant to be private.

I've attached a patch as a first attempt to include access permissions to media based on the following assumptions and limitations:

  1. Access to private media is denied by default
  2. Access is granted if the user has access to at least one entity the user has access to
  3. Permissions are checked for node entities only for now (though I think generalisation should not be that hard..).
  4. I need to find a way to filter unaccessible assets from views, e.g. in admin/content/files, as file names etc are still shown

Although a long time Drupal user this is my first patch for Drupal 8 core, so please bear with me ;-)

Eric

🐛 Bug report
Status

Postponed

Version

10.1

Component
Media 

Last updated about 12 hours ago

Created by

🇳🇱Netherlands solide-echt

Live updates comments and jobs are added and updated live.
  • Security

    It is used for security vulnerabilities which do not need a security advisory. For example, security issues in projects which do not have security advisory coverage, or forward-porting a change already disclosed in a security advisory. See Drupal’s security advisory policy for details. Be careful publicly disclosing security vulnerabilities! Use the “Report a security vulnerability” link in the project page’s sidebar. See how to report a security issue for details.

  • Needs tests

    The change is currently missing an automated test that fails when run with the original code, and succeeds when the bug has been fixed.

Sign in to follow issues

Comments & Activities

Not all content is available!

It's likely this issue predates Contrib.social: some issue and comment data are missing.

  • 🇩🇪Germany Anybody Porta Westfalica
  • 🇵🇪Peru krystalcode

    Two thumbs up to the point made on #30:

    Media has been designed around the idea of it being an independent entity. Media entities can be created independently from anything that may immediately reference them. It does not need to be referenced by anything to be useful to a site builder.

    There's plenty of cases where you intentionally want media access to be independent of the entities that reference it. If a solution is designed for what is discussed in this thread, it should be a separate module that you optionally install and definitely not force it on existing applications upon a Drupal core upgrade.

  • 🇨🇦Canada teknocat

    Further to this, it seems like it would also be prudent to have per media-type view access for any media types that use private files.

    We have built a few sites now that need to have private files. Depending on the requirements for any given site, we might use a paragraph type to attach the files to a node, whereby that paragraph type has access restrictions - thus public users can see the node, but only logged in users see the paragraph. Other times we just have a field directly on a node and that node itself might be restricted view access.

    So the tree-concept for access checks certainly makes sense, so that if the media entity was attached a field directly on a private node, or to a paragraph that's attached to a private node, then it's access would be restricted based on the root-level entity access.

    However, there may still be cases where that doesn't necessarily work, depending on the individual use cases. So being able to set view access by the media type that uses private files would offer that first level of access restriction. I mean, what happens if you detach a media entity with a private file from it's parent entity that had the access restriction on it, but somebody out there still has a link? If the media entity itself is published and "View media" is allowed by anonymous users, they can download it.

    Something we developed for a client was a document library, which provided a custom UI in the form of a Javascript Vue app that mimicked the functionality of a file desktop file explorer. This library widget is provided as a Drupal block and can then be added to a node using a block field in a paragraph, allowing the client to create a page with other content to go along with it as they see fit. We like to allow our clients to be able to manage all pages of their site the same way, add them to menus the same way etc to provide a consistent UX throughout the CMS. This doc library block and paragraph type is ONLY available to be added to a node type that is private, but the media entities themselves are in no way associated with the paragraph or the node. It's just a way to provide access to this fancy media browser, thus even if this tree-type access solution was in place it wouldn't work in this case.

    This may well be an edge case, but if there were view permissions per private media type that was used to control download access to it's files, then it would be easy. Since we already had a custom module built to provide this custom block widget, we implemented a custom permission for document library access and then implemented the appropriate hooks for media view operation as well as file download with the logic needed to prevent access based on the file and media entity type and whether or not you have the permission.

    The logic in the download hook is a bit messy, but it works.

  • Would like to echo @teknocat.
    Ran into this issue after reading through the file module overview and wrongly inferring the 'new & improved' media would behave similarly.
    The suggested media_private_access covered my use-case and helped intuitively explain the issue of
    - Media entity permissions independent of media usage
    - Media entity permission based on media usage
    Is there any chance of the per media type access drop-down making it's way into core?

Production build 0.71.5 2024